VYPR
Critical severity9.8NVD Advisory· Published Mar 5, 2026· Updated May 19, 2026

CVE-2026-2743

CVE-2026-2743

Description

Arbitrary File Write via Path Traversal upload to Remote Code Execution in SeppMail User Web Interface. The affected feature is the large file transfer (LFT).

This issue affects SeppMail: 15.0.2.1 and before

AI Insight

LLM-synthesized narrative grounded in this CVE's description and references.

A path traversal vulnerability in SeppMail's Large File Transfer component allows authenticated attackers to achieve remote code execution by overwriting /etc/syslog.conf.

Root

Cause

The Large File Transfer (LFT) component in SeppMail's User Web Interface suffers from a path traversal vulnerability during file upload. The application fails to properly sanitize user-supplied filenames, enabling an attacker to write arbitrary files to the filesystem. Specifically, the configuration file /etc/syslog.conf can be overwritten with malicious content, which is then executed by the syslog daemon, leading to remote code execution [2].

Exploitation

An attacker must first obtain an authenticated session. However, SeppMail enables self-registration by default, making it trivial to create a legitimate user account without any prior authorization. Once authenticated, the attacker can upload a crafted file via the LFT endpoint, using path traversal sequences (e.g., ../etc/syslog.conf) to target the syslog configuration. The uploaded file contains shell commands that are executed when syslog processes logs, resulting in command execution with root privileges [2].

Impact

Successful exploitation grants the attacker full remote code execution on the SeppMail gateway as root. This allows complete compromise of the appliance, including access to all emails, user data, and network communications. The vulnerability affects SeppMail versions 15.0.2.1 and earlier [2].

Mitigation

The issue has been addressed in SeppMail version 15.0.4. Users are strongly advised to upgrade to the latest release to mitigate the risk. No workaround is currently available [2].

AI Insight generated on May 19, 2026. Synthesized from this CVE's description and the cited reference URLs; citations are validated against the source bundle.

Affected products

1
  • SeppMail/SeppMailv5
    Range: unknown

Patches

0

No patches discovered yet.

Vulnerability mechanics

AI mechanics synthesis has not run for this CVE yet.

References

2

News mentions

1